lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <201606040710.ytZrHPl3%fengguang.wu@intel.com>
Date:	Sat, 4 Jun 2016 07:57:13 +0800
From:	kbuild test robot <fengguang.wu@...el.com>
To:	unlisted-recipients:; (no To-header on input)
Cc:	kbuild-all@...org, netdev@...r.kernel.org,
	Marcelo Ricardo Leitner <marcelo.leitner@...il.com>
Subject: [net-next:master 20/24] net/sctp/output.c:185:2: warning: format
 '%lu' expects argument of type 'long unsigned int', but argument 5 has type
 'size_t'

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git master
head:   330348d94223346f855357fab2517f6c903001c7
commit: 942b3235bf77e5600a05d6e85f0415bdeb8068bb [20/24] sctp: improve debug message to also log curr pkt and new chunk size
config: cris-allyesconfig (attached as .config)
compiler: cris-linux-gcc (GCC) 4.6.3
reproduce:
        wget https://git.kernel.org/cgit/linux/kernel/git/wfg/lkp-tests.git/plain/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        git checkout 942b3235bf77e5600a05d6e85f0415bdeb8068bb
        # save the attached .config to linux build tree
        make.cross ARCH=cris 

All warnings (new ones prefixed by >>):

   net/sctp/output.c: In function 'sctp_packet_transmit_chunk':
>> net/sctp/output.c:185:2: warning: format '%lu' expects argument of type 'long unsigned int', but argument 5 has type 'size_t' [-Wformat]

vim +185 net/sctp/output.c

   169	}
   170	
   171	/* This routine tries to append the chunk to the offered packet. If adding
   172	 * the chunk causes the packet to exceed the path MTU and COOKIE_ECHO chunk
   173	 * is not present in the packet, it transmits the input packet.
   174	 * Data can be bundled with a packet containing a COOKIE_ECHO chunk as long
   175	 * as it can fit in the packet, but any more data that does not fit in this
   176	 * packet can be sent only after receiving the COOKIE_ACK.
   177	 */
   178	sctp_xmit_t sctp_packet_transmit_chunk(struct sctp_packet *packet,
   179					       struct sctp_chunk *chunk,
   180					       int one_packet, gfp_t gfp)
   181	{
   182		sctp_xmit_t retval;
   183		int error = 0;
   184	
 > 185		pr_debug("%s: packet:%p size:%lu chunk:%p size:%d\n", __func__,
   186			 packet, packet->size, chunk, chunk->skb ? chunk->skb->len : -1);
   187	
   188		switch ((retval = (sctp_packet_append_chunk(packet, chunk)))) {
   189		case SCTP_XMIT_PMTU_FULL:
   190			if (!packet->has_cookie_echo) {
   191				error = sctp_packet_transmit(packet, gfp);
   192				if (error < 0)
   193					chunk->skb->sk->sk_err = -error;

---
0-DAY kernel test infrastructure                Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all                   Intel Corporation

Download attachment ".config.gz" of type "application/octet-stream" (38704 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ